共 47 条
[21]
Cuzzocrea A, 2017, IEEE INT CONF BIG DA, P4474, DOI 10.1109/BigData.2017.8258487
[22]
The Random Forest based Detection of Shadowsock's Traffic
[J].
2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 2,
2017,
:75-78
[24]
Ding RS, 2016, 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), P250, DOI 10.1109/CompComm.2016.7924703
[25]
Draper-Gil Gerard, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P407
[27]
Jia LY, 2017, I C COMM SOFTW NET, P239, DOI 10.1109/ICCSN.2017.8230113
[28]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262
[29]
Lee SH, 2017, ASIA-PAC NETW OPER M, P259, DOI 10.1109/APNOMS.2017.8094123